Sciweavers

302 search results - page 36 / 61
» Playing with Rules
Sort
View
CSREASAM
2006
13 years 9 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
IASSE
2004
13 years 9 months ago
System Evolution through Design Information Evolution: a Case Study
This paper describes how design information, in our case UML specifications, can be used to evolve a software system and validate the consistency of such an evolution. This work c...
Walter Cazzola, Ahmed Ghoneim, Gunter Saake
ECEASST
2008
69views more  ECEASST 2008»
13 years 7 months ago
Verifying Model Transformations by Structural Correspondence
: Model transformations play a significant role in model based software development, and the correctness of the transformation is crucial to the success of the development effort. ...
Anantha Narayanan, Gabor Karsai
CIE
2005
Springer
13 years 7 months ago
Atomic actions -- molecular experience: theory of pervasive gaming
The attempt of this paper is to describe and analyze the formalisms of pervasive games and pervasive gaming (PG). As the title indicates, PG consists of atomic entities that never...
Bo Kampmann Walther
ICIP
2010
IEEE
13 years 5 months ago
Ball event recognition using hmm for automatic tennis annotation
A key element for video indexing and summarisation is the description of isolated events and actions. In the context of many sports the motion of the ball plays an essential role ...
Ibrahim Almajai, Josef Kittler, Teofilo de Campos,...